{"id":10504,"date":"2019-01-17T00:58:44","date_gmt":"2019-01-17T00:58:44","guid":{"rendered":"http:\/\/news.cpanel.com\/?p=55629"},"modified":"2019-01-17T00:58:44","modified_gmt":"2019-01-17T00:58:44","slug":"%d8%a8%d8%b1%d9%88%d8%b2-%d8%b1%d8%b3%d8%a7%d9%86%db%8c-%d8%a7%d9%85%d9%86%db%8c%d8%aa%db%8c-%d8%af%d8%b1-easyapache-4","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/%d8%a8%d8%b1%d9%88%d8%b2-%d8%b1%d8%b3%d8%a7%d9%86%db%8c-%d8%a7%d9%85%d9%86%db%8c%d8%aa%db%8c-%d8%af%d8%b1-easyapache-4\/","title":{"rendered":"\u0628\u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u062f\u0631 EasyApache 4"},"content":{"rendered":"<div dir=\"ltr\"><img decoding=\"async\" class=\"ff-og-image-inserted\" src=\"http:\/\/news.cpanel.com\/wp-content\/uploads\/2017\/01\/og-cPnews-1.jpg\" alt=\"\" title=\"\"><\/div>\n<p dir=\"ltr\">We are happy to announce that cPanel, L.L.C. has released an update for EasyApache 4! Take a look at some highlights below, and then join us on\u00a0<a href=\"https:\/\/cpanel.wiki\/go.cpanel.net\/slack\" target=\"_blank\" rel=\"noopener\">Slack<\/a>,\u00a0<a href=\"https:\/\/cpanel.wiki\/go.cpanel.net\/discord\" target=\"_blank\" rel=\"noopener\">Discord<\/a>, or\u00a0<a href=\"https:\/\/reddit.com\/r\/cpanel\/\" target=\"_blank\" rel=\"noopener\">Reddit<\/a>\u00a0to talk about this update and much more.<\/p>\n<p dir=\"ltr\">This release includes a security patch that has been issued a fix for a CVE (Common Vulnerabilities and Exposures), the details of which are included below.<\/p>\n<p dir=\"ltr\"><strong>SUMMARY<\/strong><br \/>\ncPanel, L.L.C. has updated RPMs for EasyApache 4 with PHP versions 5.6.40, 7.1.26, and 7.2.14. This release addresses vulnerabilities related to CVE-2016-10166, CVE-2018-19935, and several other vulnerabilities which have not yet been assigned a number. We strongly encourage all PHP 5.6 users to upgrade to version 5.6.40, all PHP 7.1 users to upgrade to version 7.1.26, and all PHP 7.2 users to upgrade to version 7.2.14.<\/p>\n<p dir=\"ltr\"><strong>AFFECTED VERSIONS<br \/>\n<\/strong> All versions of PHP 5.6 through 5.6.39<br \/>\nAll versions of PHP 7.1 through 7.1.25<br \/>\nAll versions of PHP 7.2 through 7.2.13<\/p>\n<p dir=\"ltr\"><strong>SECURITY RATING<\/strong><br \/>\nThe National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:<\/p>\n<p dir=\"ltr\">CVE-2016-10166 \u2013 MEDIUM<br \/>\nPHP 5.6.40<br \/>\nFixed bug in GD module related to CVE-2016-10166<\/p>\n<p dir=\"ltr\">PHP 7.1.26<br \/>\nFixed bug in GD module related to CVE-2016-10166<\/p>\n<p dir=\"ltr\">PHP 7.2.14<br \/>\nFixed bug in GD module related to CVE-2016-10166<\/p>\n<p dir=\"ltr\">CVE-2018-19935 \u2013 HIGH<br \/>\nPHP 7.1.26<br \/>\nFixed bug in IMAP module related to CVE-2018-19935<\/p>\n<p dir=\"ltr\">PHP 7.2.14<br \/>\nFixed bug in IMAP module related to CVE-2018-19935<\/p>\n<p dir=\"ltr\">There are other security vulnerabilities included in this release which have not yet been assigned numbers.<\/p>\n<p dir=\"ltr\">SOLUTION<br \/>\ncPanel, L.L.C. has released updated RPMs for EasyApache 4 on January 16, 2019, with updated versions of PHP 5.6.40, 7.1.26, and 7.2.14. Unless you have enabled automatic RPM updates in your cron, update your system with either yum update or WHM\u2019s Run System Update interface.<\/p>\n<p dir=\"ltr\">REFERENCES<br \/>\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-19935\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-19935<\/a><br \/>\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-10166\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-10166<\/a><br \/>\n<a href=\"http:\/\/www.php.net\/ChangeLog-5.php\" target=\"_blank\" rel=\"noopener\">http:\/\/www.php.net\/ChangeLog-5.php<\/a><br \/>\n<a href=\"http:\/\/www.php.net\/ChangeLog-7.php\" target=\"_blank\" rel=\"noopener\">http:\/\/www.php.net\/ChangeLog-7.php<\/a><\/p>\n<p dir=\"ltr\">For the PGP-signed message, please see\u00a0<a href=\"http:\/\/news.cpanel.com\/wp-content\/uploads\/2019\/01\/EA4-2019-1-16-CVE-signed.txt\" target=\"_blank\" rel=\"noopener\">EA4 2019-1-16 CVE-signed<\/a>.<\/p>\n<p dir=\"ltr\"><strong>More Information<\/strong><\/p>\n<p dir=\"ltr\">Information about all releases this year can be found in the\u00a0<a href=\"https:\/\/documentation.cpanel.net\/display\/EA4\/EasyApache+4+Change+Log+2019\" target=\"_blank\" rel=\"noopener\">2019 EasyApache 4 Changelog<\/a>\u00a0and\u00a0the\u00a0<a href=\"https:\/\/documentation.cpanel.net\/display\/EA4\/EasyApache+4+Release+Notes\" target=\"_blank\" rel=\"noopener\">EasyApache 4 Release Notes<\/a>. To ensure that you receive up-to-date product news from cPanel, we encourage you to subscribe to the Product and Security updates\u00a0mailing list on\u00a0<a href=\"https:\/\/cpanel.net\/mailing-list\" target=\"_blank\" rel=\"noopener\">our website.<\/a><\/p>\n<p dir=\"ltr\">\u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0648 \u0645\u0634\u0627\u0648\u0631\u0647 &#8211; \u062b\u0628\u062a \u062f\u0627\u0645\u0646\u0647<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are happy to announce that cPanel, L.L.C. has released an update for EasyApache 4! Take a look at some highlights below, and then join us on\u00a0Slack,\u00a0Discord, or\u00a0Reddit\u00a0to talk about this update and much more. This release includes a security patch that has been issued a fix for a CVE (Common Vulnerabilities and Exposures), the &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-10504","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/10504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=10504"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/10504\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=10504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=10504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=10504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}